MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f150c064aa08e8d327c99a2edf0811a9bb6e06398d0d846b69a0c321ff6ab259. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: f150c064aa08e8d327c99a2edf0811a9bb6e06398d0d846b69a0c321ff6ab259
SHA3-384 hash: 86ff405216ff94e4cd142d4e023f85ebda48e0bf9292d816d7951f771f3437a9ed3a861165457db268d7b6e7f504b84f
SHA1 hash: a5b3ab13138039b198a3454d99fd9e43a5d10f3b
MD5 hash: 83e6e738876fde792abae146193d4963
humanhash: nineteen-double-maryland-golf
File name:SecuriteInfo.com.W32.AIDetect.malware2.24812.11752
Download: download sample
Signature RedLineStealer
File size:287'744 bytes
First seen:2021-09-03 01:47:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b7ebe503aba8ff6fce4b2b89581116dd (4 x ArkeiStealer, 3 x Stop, 2 x RedLineStealer)
ssdeep 6144:UI7zL718A97H9E5SGCeGDJkaPtVvMG+8K:UI7zHSo7ds1Cv9tm
Threatray 1'881 similar samples on MalwareBazaar
TLSH T14554E03177A1C433D5E2E9749874CEA02B3FB8A62964828B76753F1B2D712C1963235F
dhash icon 4839b2b0e8c38890 (105 x RaccoonStealer, 38 x Smoke Loader, 33 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
162
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.W32.AIDetect.malware2.24812.11752
Verdict:
Malicious activity
Analysis date:
2021-09-03 01:49:59 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a file
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Contains functionality to inject code into remote processes
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-03 01:13:48 UTC
AV detection:
17 of 43 (39.53%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.29:8678
Unpacked files
SH256 hash:
9535c968deac76b07b81338316691050af68de604c5ac9b8ce88fb13af79aa22
MD5 hash:
b726df75f1ef2ca4e8e4c201cc323464
SHA1 hash:
afbc5f2384bad1cf44d88b3e6a0e2e08683ddfcf
SH256 hash:
49024e791cf17a4255a3b5a33bfede6ed8f9ab28c34d7b10ce7c3676498fa969
MD5 hash:
0d79cf0987744082d998343280d9b2d5
SHA1 hash:
6810c7f1f15bdd644e0c0ffd0e341c71dc2deeeb
SH256 hash:
71834babc65f6ca37d984e3cd28656ccfdfc7947d65c92080c84df0dd261b3d0
MD5 hash:
930113d93ac139570d8cf41e39400215
SHA1 hash:
0152da485ccfb299b2f17bd3af7e5c733b1f294d
SH256 hash:
f150c064aa08e8d327c99a2edf0811a9bb6e06398d0d846b69a0c321ff6ab259
MD5 hash:
83e6e738876fde792abae146193d4963
SHA1 hash:
a5b3ab13138039b198a3454d99fd9e43a5d10f3b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe f150c064aa08e8d327c99a2edf0811a9bb6e06398d0d846b69a0c321ff6ab259

(this sample)

  
Delivery method
Distributed via web download

Comments